What you can expect
Reporting directly to the Cyber Security Analyst, you will support him and oversee the following activities:
Your responsibilities include, but are not limited to :
- Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems, firewalls and host-based security systems
- Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
- Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
- Reviews alerts and data from sensors, and documents formal, technical incident reports
- Works with threat intelligence and/or threat-hunting teams
- Support the Cyber Security Analyst to provides users with incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
- Perform security standards testing against ICT Asset (Devices, Applications, Projects,… ) before implementation to ensure security
Threat and Vulnerability Management :
- Research threats and vulnerabilities and, where appropriate, takes action to mitigate threats and remediate vulnerabilities
- Reviews, assesses, and mitigates penetration tests and vulnerability assessments on information systems and infrastructure
- Recommends, schedule sand/or applies fixes, security patches and any other measures required in the event of a security breach
- Monitors security vulnerability information from vendors and third parties
Event Management :
- Responds to and, where appropriate, resolves or escalates reported security incidents
- Monitors system logs, SIEM tools and network traffic for unusual or suspicious activity. Interprets such activity and makes recommendations for resolution
- Investigates and resolves security violations by providing postmortem analysis to illuminate the issues and possible solutions
Infrastructure Protection :
- Participates in infrastructure projects to develop, plan and implement specifications for network and distributed system security technologies in support of key information systems
- Support system hardening efforts
Risk and Control Assessment :
Implements or coordinates remediation required by audits, and documents exceptions as necessary
Performs system and application vulnerability testing
Participates in enterprise testing and assessment activities as a representative of Luxembourg business unit